Quoting the article:
"GPS devices can also be hacked, said Knesek.
“'It’s going to take one young woman to be stalked, raped and killed before people realize the need security on GPS,' said Knesek a former cybersecurity expert for the U.S. FBI who worked on the Kevin Mitnick case."
I don't understand what he's saying.
The problem with the GPS signal being hackable, i.e. unauthenticated, which is the source of controversy and discussion, is NOT that someone's location can be determined by someone else. It is that GPS users in a given general area can be provided with bad location info.
How this makes a mobile device user more stalkable, I don't know. What might make such a user more stalkable is a nonsecure cell telephone, texting, or web browsing comm link, in which comm link divulges that user's GPS location. But authenticating the GPS signal won't help this scenario at all. The only thing that would help is encrypting the cell phone or texting or other apps.
GPS is a one-way broadcast signal, satellites to users. That's all. Nothing goes out from the user' mobile device when that users receives GPS data, UNLESS some other application in the device uses the location data and in turn transmits it out.

Malware is unauthorized software from third parties attempting to get a user's computer to do something malicious the user is not aware of.
It does not include preference monitoring by the Web service provider the end user is accessing.

After selling operating systems for 20years without antivirus solution, Microsoft had realized the necessities of designing security solution running by the OS designer/developer only.
Similar way the security solution is an acute need for mobile/tablet platform designed by Google.
I hope that they will realize the need in a early stage.

IOS has the most zero day vulnerabilities of any mobile OS. not sure that is a smart idea.
People are jailbreaking their phone (ie modifying the system on the phone) just by visiting a website.
http://web.nvd.nist.gov/view/vuln/search-results?query=ios+apple&search_type=all&cves=on

The question is what information can be accessed by malware. Everyone will have concern on saved password be accessed. Will you have concern if your contact list (aka address book) is accessed? We definitely need to pay attention to our connected devices; yet, we shall react and draw a conclusion too quick too soon. I would love to read the report from BT that shows the detail of study and which apps are the suspect.

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)

My Mom the Radio StarMax MaxfieldPost a commentI've said it before and I'll say it again -- it's a funny old world when you come to think about it. Last Friday lunchtime, for example, I received an email from Tim Levell, the editor for ...

A Book For All ReasonsBernard Cole1 CommentRobert Oshana's recent book "Software Engineering for Embedded Systems (Newnes/Elsevier)," written and edited with Mark Kraeling, is a 'book for all reasons.' At almost 1,200 pages, it ...